Filters
Question type

Study Flashcards

What is a SysSP and what is one likely to include?

Correct Answer

verifed

verified

SysSPs often function as standards or pr...

View Answer

Which of the following is NOT among the three types of InfoSec policies based on NIST's Special Publication 800-14?


A) Enterprise information security policy
B) User-specific security policies
C) Issue-specific security policies
D) System-specific security policies

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

The 'Authorized Uses' section of an ISSP specifies what the identified technology cannot be used for.

A) True
B) False

Correct Answer

verifed

verified

Which section of an ISSP should outline a specific methodology for the review and modification of the ISSP?


A) Policy Review and Modification
B) Limitations of Liability
C) Systems Management
D) Statement of Purpose

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Technology is the essential foundation of an effective information security program​._____________

A) True
B) False

Correct Answer

verifed

verified

What are configuration rules?Provide examples.

Correct Answer

verifed

verified

Configuration rules are instructional co...

View Answer

What is the final component of the design and implementation of effective policies?Describe this component.

Correct Answer

verifed

verified

The final component of the design and im...

View Answer

The three types of information security policies include the enterprise information security policy,the issue-specific security policy,and the ____________________ security policy.

Correct Answer

verifed

verified

system-spe...

View Answer

List the major components of the ISSP.

Correct Answer

verifed

verified

Statement of Purpose Authorize...

View Answer

Examples of actions that illustrate compliance with policies are known as laws.

A) True
B) False

Correct Answer

verifed

verified

A section of policy that should specify users' and systems administrators' responsibilities.


A) capability table
B) statement of purpose
C) Bull's eye model
D) SysSP
E) procedures
F) InfoSec policy
G) standard
H) access control lists
I) systems management
J) ISSP

K) B) and F)
L) B) and H)

Correct Answer

verifed

verified

An organizational policy that provides detailed,targetedguidance to instruct all members of the organization in the use of a resource,such as one of itsprocesses or technologies.


A) capability table
B) statement of purpose
C) Bull's eye model
D) SysSP
E) procedures
F) InfoSec policy
G) standard
H) access control lists
I) systems management
J) ISSP

K) B) and E)
L) I) and J)

Correct Answer

verifed

verified

A detailed outline of the scope of the policy development project is created during which phase of the SecSDLC?


A) design
B) analysis
C) implementation
D) investigation

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

According to NIST SP 800-18,Rev.1,whichindividual is responsible for the creation,revision,distribution,and storage of the policy?


A) policy developer
B) policy reviewer
C) policy enforcer
D) policy administrator

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A(n)____________________,which is usually presented on a screen to the user during software installation,spells out fair and responsible use of the software being installed.

Correct Answer

verifed

verified

end-user license agr...

View Answer

In the bull's-eye model,the ____________________ layer is the place where threats from public networks meet the organization's networking infrastructure.

Correct Answer

verifed

verified

Showing 41 - 56 of 56

Related Exams

Show Answer